Friday, April 11, 2025
HomeApacheHackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

Hackers Exploit Apache Tomcat Flaw to Hijack Servers and Steal SSH Credentials

Published on

SIEM as a Service

Follow Us on Google News

A newly discovered attack campaign has exposed vulnerabilities in Apache Tomcat servers, allowing hackers to hijack resources and steal SSH credentials.

Researchers from Aqua Nautilus revealed that these attacks, which weaponized botnets within 30 hours of discovery, employ encrypted payloads and advanced persistence mechanisms to infiltrate systems running both Windows and Linux platforms.

The attackers initiate their campaign by brute-forcing weak credentials on the Tomcat management console using Python scripts.

- Advertisement - Google News

Once access is gained, they upload malicious JavaServer Pages (JSP) files designed to establish backdoors and escalate privileges.

These scripts enable the execution of arbitrary Java code, leveraging AES encryption to decode payloads and load new classes dynamically.

The malware disguises itself as kernel processes to evade detection while exploiting system resources for cryptomining operations.

Apache Tomcat Flaw
 Attack Flow of the Tomcat campaign 2025

Malware Capabilities and Spread

The attack infrastructure deploys two primary web shells: one for backdoor creation and another for privilege escalation and persistence.

The first script decodes encrypted requests and executes arbitrary code, while the second script downloads additional payloads, including executable files for Windows systems or shell scripts for Linux environments.

These scripts also extract SSH keys from compromised machines, enabling lateral movement across networks.

The malware further complicates detection by employing anti-debugging techniques, memory mapping, and cloning processes under fake kernel process names such as “[cpuhp/0]” and “[kworker/R-rcu_p].”

It connects to cryptomining pools like gulf.moneroocean.stream to mine cryptocurrency in the background while maintaining persistence by copying itself across multiple directories.

Indicators of Compromise (IOCs)

Researchers at AquaSec identified several indicators of compromise associated with this campaign:

  • IP Addresses: Attackers used IPs such as 209.141.37.95 and 138.201.247.154 for payload delivery.
  • Domains: The domain “dbliker.top” hosted malicious scripts disguised behind fake 404 error pages.
  • Files: Malicious JSP files (e.g., test.jsp, tomcat.jsp) and packed ELF binaries were used to execute the attack.
Apache Tomcat Flaw
 The website returns a fake 404 missing page error while the payload is hidden inside the html

To defend against such attacks, organizations must prioritize patching critical vulnerabilities like CVE-2025-24813 in internet-facing applications such as Tomcat servers.

Additional measures include:

  • Disabling unused services and management interfaces to reduce exposure.
  • Implementing strict privilege management using Role-Based Access Control (RBAC).
  • Isolating critical servers through network segmentation and firewalls to block outbound connections to cryptomining pools.
  • Deploying runtime protection tools capable of detecting malware behavior and cryptominers in real-time.

This campaign highlights the urgency of securing workloads reliant on Apache Tomcat servers against emerging threats.

With hackers exploiting vulnerabilities at unprecedented speeds, organizations must adopt proactive measures, including patch management, privilege restrictions, and runtime security solutions, to safeguard their systems from sophisticated attacks targeting cloud-native environments.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...

Researchers Exploit Windows Defender with XOR and System Calls

A recent cybersecurity revelation has demonstrated how researchers successfully bypassed Windows Defender antivirus mechanisms...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...